Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

39results about How to "Support diversity" patented technology

Multistage boot load method of embedded equipment

The invention provides a multistage boot load method of embedded equipment. Flash of the embedded equipment is sequentially divided into a boot loader 2 partition, an image partition and a data configuration partition. The multistage boot load method comprises the following steps of: adding a boot loader 1 partition in a storage area, wherein the boot loader 1 partition has the functions of upgrading, guiding and configuring the boot loader 2; after the equipment is electrified, starting the boot loader 1 firstly; checking whether a command for upgrading / configuring the boot loader 2 is input or not within an appointed time in a circulating way; if the command is not input, guiding the boot loader 2 to start by the boot loader 1, and finishing a start flow; and if the command is input, upgrading / configuring the boot loader 2 by the boot loader 1, and skipping to the boot loader 2 after the upgrading / configuring to execute equipment reboot or directly reboot the equipment. According to the multistage boot load method provided by the embodiment of the invention, the diversity of an image and the boot loader are supported, and the safety requirements during the embedded upgrading are also satisfied.
Owner:SHENZHEN GONGJIN ELECTRONICS CO LTD

Application program executing permission control method used for operating system

The the invention discloses an application program executing permission control method used for an operating system. The method includes the following steps: classifying application programs in the operating system; establishing an executing permission control strategy of the application programs; when the application programs execute requests, checking classifying marks of the application programs, verifying completeness of the application programs if the classifying marks allow all users to execute or are protected and are tampering-proof, executing if verification passes, and refusing to execute if verification fails; if the classifying marks allow or refuse part of users to execute, inquiring the executing permission control strategy on the basis of inherent information of the application programs, executing if the executing permission control strategy returned by inquiring allows the application programs to be executed, and refusing to execute if not; if the classifying marks are empty or refuse all users to execute, refusing toe execute the application programs. The application program executing permission control method has the advantages of high malicious software preventing capability, safety, reliability, high stability, high universality and high expandability.
Owner:NAT UNIV OF DEFENSE TECH

Broadband trunking service realizing method and broadband trunking service realizing system

The invention discloses a broadband trunking service realizing method and a broadband trunking service realizing system. The method comprises the following steps: when the service type of an established trunked call service is transformed from a first type to a second type, a trunked scheduling subsystem modifies a T1 bearer of a trunked call service corresponding to a base station to which group member terminals belongs according to QoS parameters corresponding to the trunked call service of the second type, and notifies the base station to reestablish a downlink shared bearer for the group member terminals managed by the base station; and the trunked scheduling subsystem notifies the group member terminals that the service type of the trunked call service is changed after reestablishment of the downlink shared bearer is finished. With the broadband trunking service realizing method and the broadband trunking service realizing system, diversification and real-time transmission of broadband services can be realized.
Owner:SHENZHEN ZTE TRUNKING TECH CORP

Loose coupling role authorized-type implementation access control method and system thereof

The invention discloses a loose coupling role authorized-type implementation access control method and a system thereof. The method comprises the following steps of: adding a user role incidence relation based on a type implementation access control method; adding a related process type transformation rule definition relating to a user role and a corresponding type transformation decision mechanism; when a system process type is transformed, according to the process type transformation rule, judging whether to perform role related type transformation according to a current role of the user to change a user process execution flow; and entering a specific security domain of the user role. The system comprises a type implementation access control policy module, a policy security configuration module and a policy rule configuration module, wherein the type implementation access control policy module is operated in the kernel of an operating system; the policy security configuration module is operated on the user layer of the operating system; and the policy rule configuration module is positioned in a file system. The method and the system have the advantages of reducing the influence of user role configuration change on a type implementation rule system, reducing the security configuration difficulties, facilitating flexible configuration according to actual service conditions.
Owner:NAT UNIV OF DEFENSE TECH

Tunnel selection method in optimization of visit between hosts under edge network double stack access

The invention discloses a tunnel selection method in the optimization of visit between hosts under edge network double stack access, belonging to the field of the Internet technology. The tunnel selection method is characterized in that a tunnel selection mechanism is added to a consultation mechanism between client access equipment CPE and a network address decoder CGN, which is introduced underedge network double stack access; under the condition that all the CPEs support the tunnel mechanism in 2-3 and the CGN feeds back CGN tunnel information to each CPE according to the IPv6 address of each CPE, tunnel types supported by the CPEs and the priority grade thereof, the CGN is used for maintaining the tunnel types and other information under the edge network double stack access, and after being confirmed by the CGN, and tunnels used in the tunnel consultation mechanism are sent to the CPE used as source terminals. By the invention, the problem how to select a more proper tunnel type to carry out tunnel transmission when various tunnel mechanisms coexist can be solved, thereby better supporting the diversity of network application.
Owner:TSINGHUA UNIV

Reconfigurable variable length FIR filters for optimizing performance of digital repeater

The invention addresses the problem of parameter optimization for best filter performance and, in particular, the influence from the requirements on radio or fiber to radio repeaters utilizing those filters, that often proves to be conflicting for an FIR filter. The FIR filters are implemented in a programmable circuit and are not thereby restricted for use in communication repeaters although this particular usage may put the most serious restrictions on the filter performance. Within the imposed constraints, this disclosure illustrates a method to strike a middle ground while minimizing the trade-offs. The advantage of the concept presented allows the choice of a suitable filter pertaining to a particular traffic configuration, meaning a particular choice of individually filtered frequency bands set at different gain and intended to support a diversity of traffic formats. The disclosed approach banks on the reconfigurable variable length FIR filter architectures. Implementation architecture and results in brief are also presented.
Owner:INTEL CORP

Printing apparatus and printing method

The invention relates to the technical field of the internet, in particular to a printing apparatus and a printing method. The printing apparatus comprises a configuration management unit, a printing context plant, a printing context library and a virtual context interface, wherein the configuration management unit is used for providing a printing device configuration interface for a user to configure printing device information needed to be used, and storing the printing device information; the printing context plant is used for obtaining a printing context corresponding to the printing device information stored by the configuration management unit from the printing context library and writing the printing context in the virtual context interface; the printing context library is used for storing printing contexts corresponding to different printing devices; and the virtual context interface is used for storing the printing contexts written by the printing context plant and providing a printing call interface.
Owner:KOUBEI HLDG

Progress authentication method based on password

ActiveCN104408365AReduce risks such as process execution and tamperingImprove securityDigital data authenticationControl switchExtensibility
The invention discloses a progress authentication method based on a password. The method comprises the following steps: setting an authentication password for a progress, calculating the HMAC value of the progress according to the authentication password and storing the HMAC value in extended attributes; presetting a password acquisition control switch in an operating system and configuring password acquisition control switch states; after receiving an operation request of the progress, judging whether to check the password according to the password acquisition control switch, acquiring the authentication password if needing to check the password; calculating the HMAC value of the progress based on the authentication password, comparing the HMAC value obtained by calculation with the HMAC value in the extended attributes of the progress, judging that the password authentication of the progress is successful and continuing the operation request of the progress if the HMAC values are the same, otherwise rejecting the operation request of the progress. The method disclosed by the invention has the advantages of reducing the risk of falsification of the system progress and being high in safety, good in universality and high in extensibility.
Owner:NAT UNIV OF DEFENSE TECH

A computer vision-based mobile application testing system and method

The present invention discloses a computer vision based mobile terminal application testing system and method. The system comprises an image script test module and an automatic test module. The image script test module obtains screen images and screen information simultaneously, reads a template image in a script and information in the template image, and executes a template matching algorithm; if the match is successful, an image matching result is returned, and if the match fails, a feature point matching algorithm is executed; and if the match is successful, the image matching result is returned, and if the matching fails, failure codes are returned. The automatic test module obtains an original image, calculates a saliency grayscale image of the original image by using a saliency detection algorithm, converts the saliency image into a binary image, and applies a random algorithm or a K-means algorithm to the saliency binary image to determine a saliency point set to automatically finish clicking and recording. The system and the method disclosed by the present invention improve test efficiency, are applicable to a wide variety of mobile devices, and greatly reduce the learning cost and provide test convenience for a tester by using two manners of a given script and full-automation.
Owner:INST OF SOFTWARE - CHINESE ACAD OF SCI

Charging communication protocol framework for electric vehicle and off-board charger and implementation method thereof

The invention discloses a charging communication protocol framework for an electric vehicle and an off-board charger and an implementation method thereof. The charging communication protocol framework comprises a plurality of ordered function modules: version negotiation, function negotiation, parameter configuration, authentication, reservation, charging system self-inspection, pre-charging and energy transmission, and charging ending; the charging communication protocol is composed of all necessary function modules and zero or more optional function modules in the framework, and supports one or more application examples of the function modules capable of being reloaded at the same time; different versions of communication protocols can support different option function modules and different application examples of reloading function modules; the vehicle/charger following a certain specific version of communication protocol can realize all/part of functions supported by the version of communication protocol according to own realization conditions and requirements; through version negotiation, function negotiation and flexible configuration of the selectable function module and the reloaded function module, the requirements of the charging communication protocol for compatibility, expansibility and flexibility are met.
Owner:STATE GRID ELECTRIC POWER RES INST +1

Hardware fault-oriented method and device for correcting faults in key files of system

The invention discloses a hardware fault-oriented method and a hardware fault-oriented device for correcting faults in key files of a system. The method comprises the following steps: (1), establishing a backup file table which contains information of the key files of the system, establishing a copy file for each target file of the backup file table and maintaining synchronization of the copy files and the target files; (2), detecting file operation fault of an operating system in real time and diagnosing the reason of the fault, when the file confronting the operation fault is the target file corresponding to the backup file table and the fault is caused by hardware fault of a storage system, carrying out next step; and (3), replacing the file encountering the operation fault with the corresponding copy file and trying to operate the file again. The device comprises a copy file managing module, a fault detecting module, a fault diagnosing module and a fault processing module. According to the method and the device, the problem of system down or service crash caused by file access failure can be prevented; and the method and the device have the advantages of good fault tolerance characteristic, high robustness, real-time fault recovery, transparency to user, strong expandability and good commonality.
Owner:NAT UNIV OF DEFENSE TECH +1

A Method of User Authorization on Demand Supporting Least Privilege

The invention discloses a user on-demand authorization method capable of supporting least privilege. The method comprises the following implementation steps: establishing a plurality of roles in an operating system, and setting a verification password for each role; defining different permission classes needed by running of different application programs as different permission types; associating a user with the corresponding role and the corresponding permission type of the role during login, wherein role conversion or permission type conversion can be carried out according to program requirements; finally extracting the current role and the permission type information of the user, judging whether a program requested by the user is allowed to be executed or not on the basis of the current role and the permission type of the user, if yes, executing the program requested by the user, and otherwise, prohibiting executing the program requested by the user. According to the method, authorization can be carried out according to actual permission requirements of different applications, the applications only have associated permissions to complete normal functions when the user executes the applications, the safety is guaranteed, the usability of the system is improved, the generality is high, and the application range is wide.
Owner:NAT UNIV OF DEFENSE TECH

Buried point-based data acquisition method and device, electronic equipment and storage medium

PendingCN112685259ASolve the problem of excessive resource consumptionSupport diversityHardware monitoringComputer hardwareControl set
The invention relates to a big data technology, and discloses a buried point-based data acquisition method, which comprises the following steps of: detecting a control click event in a pre-constructed page, and selecting a buried point control matched with the control click event from a buried point control set of the pre-constructed page to obtain a target buried point control; obtaining a visual buried point category of the target buried point control, and generating a buried-point-free parameter configuration table according to the visual buried point category; and acquiring parameter data triggered by the control click event based on the buried-point-free parameter configuration table. The invention also relates to a blockchain technology. The target buried point control can be deployed in a blockchain node. According to the invention, type parameter configuration of data acquisition based on buried points can be realized, and flexibility of data acquisition based on buried points is supported.
Owner:PING AN SECURITIES CO LTD

Network communication method and device

An embodiment of the present invention provides a network communication method, including: after receiving the indication message sent by the first fusion control device, the second fusion control device acquires a preset proportion of the service data that the first fusion control device needs to transmit business data; the second fusion control device performs parameter matching on the preset ratio of business data according to the system parameters of the current communication standard; the second fusion control device transmits the matched data through the corresponding data link layer The preset ratio of business data. The embodiment of the present invention also discloses a network communication device. By implementing the embodiment of the present invention, the temporary interruption of the service flow of the user terminal can be avoided, and the consistency of user experience can be ensured, so that the overall efficiency of the communication system is higher.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products